-
1
-
-
41449108152
-
A singular-value decomposition-based image watermarking using genetic algorithm
-
Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. Int J Electron Commun 62: 386-394
-
(2008)
Int J Electron Commun
, vol.62
, pp. 386-394
-
-
Aslantas, V.1
-
2
-
-
0032637701
-
Copyright protection for the electronic distribution of text
-
Brassil JT, Low S, Maxemchuk NF (1999) Copyright protection for the electronic distribution of text. Proc IEEE 87(7): 1181-1196
-
(1999)
Proc IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
3
-
-
33645152302
-
Lossless watermarking for image authentication: A new framework and an implementation
-
Celik MU, Sharma G, Saber E, Tekalp AM (2006) Lossless watermarking for image authentication: A new framework and an implementation. IEEE Trans Image Process 15: 1042-1049
-
(2006)
IEEE Trans Image Process
, vol.15
, pp. 1042-1049
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
4
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11: 585-595
-
(2002)
IEEE Trans Image Process
, vol.11
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
5
-
-
0036477368
-
Robust authentication scheme for protecting copyrights of images and graphics
-
Chang CC, Hwang KF, Hwang MS (2002) Robust authentication scheme for protecting copyrights of images and graphics. IEE Proc Vis Image Signal Process 149: 43-50
-
(2002)
IEE Proc Vis Image Signal Process
, vol.149
, pp. 43-50
-
-
Chang, C.C.1
Hwang, K.F.2
Hwang, M.S.3
-
6
-
-
49149097304
-
A DWT based approach for image steganography
-
Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3): 275-290
-
(2006)
Int J Appl Sci Eng
, vol.4
, Issue.3
, pp. 275-290
-
-
Chen, P.-Y.1
Lin, H.-J.2
-
7
-
-
0003509044
-
-
Yale University, New Haven, CT
-
Coifman R, Meyer Y, Quake S, Wickerhauser V (1990) Signal processing and compression with wave packets Numerical Algorithms Research Group. Yale University, New Haven, CT
-
(1990)
Signal Processing and Compression With Wave Packets Numerical Algorithms Research Group
-
-
Coifman, R.1
Meyer, Y.2
Quake, S.3
Wickerhauser, V.4
-
8
-
-
0036488363
-
The First 50 Years of Electronic Watermarking
-
Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking. EURASIP JASP 2: 126-132
-
(2002)
EURASIP JASP
, vol.2
, pp. 126-132
-
-
Cox, I.J.1
Miller, M.L.2
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox IJ, Kilian J, Leighton T, Shamoon TG (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12): 1673-1687
-
(1997)
IEEE Trans Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.G.4
-
11
-
-
0024255761
-
Coherent oscillations: A mechanism of feature linking in the visual cortex
-
Eckhorn R, Bauer R, Jordan W, Brosch M, Kruse W, Munk M, Reitboeck HJ (1988) Coherent oscillations: A mechanism of feature linking in the visual cortex. Biol Cybern 60: 121-130
-
(1988)
Biol Cybern
, vol.60
, pp. 121-130
-
-
Eckhorn, R.1
Bauer, R.2
Jordan, W.3
Brosch, M.4
Kruse, W.5
Munk, M.6
Reitboeck, H.J.7
-
12
-
-
0001219231
-
Feature Linking via Synchronization among Distributed Assemblies: Simulations of Results from Cat Visual Cortex
-
Eckhorn R, Reitboeck HJ, Arndt M (1990) Feature Linking via Synchronization among Distributed Assemblies: Simulations of Results from Cat Visual Cortex. Neural Comp 2: 293-307
-
(1990)
Neural Comp
, vol.2
, pp. 293-307
-
-
Eckhorn, R.1
Reitboeck, H.J.2
Arndt, M.3
-
13
-
-
0032689575
-
Neural mechanisms from visual cortex suggest basic circuits for linking field models
-
Eckhorn R (1999) Neural mechanisms from visual cortex suggest basic circuits for linking field models. IEEE Trans Neural Netw 10: 464-479
-
(1999)
IEEE Trans Neural Netw
, vol.10
, pp. 464-479
-
-
Eckhorn, R.1
-
14
-
-
43749116409
-
Accurate detection of prostate boundary in ultrasound images using biologically inspired spiking neural network
-
In: Xiamen, China
-
El-dahshan E, Redi A, Hassanien AE, Xiao K (2007) Accurate detection of prostate boundary in ultrasound images using biologically inspired spiking neural network. In: International Symposium on Intelligent Siganl Processing and Communication Systems Proceeding, Nov. 28-Dec. 1, 2007. Xiamen, China, pp 333-336
-
(2007)
International Symposium on Intelligent Siganl Processing and Communication Systems Proceeding, Nov. 28-Dec. 1, 2007
, pp. 333-336
-
-
El-dahshan, E.1
Redi, A.2
Hassanien, A.E.3
Xiao, K.4
-
15
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87: 1079-1107
-
(1999)
Proc IEEE
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
16
-
-
6344227265
-
An iris recognition system to enhance E-security environment based on wavelet theory
-
Hassanien AE, Jafar MA (2003) An iris recognition system to enhance E-security environment based on wavelet theory. Adv Model Optim J 5(2): 93-104
-
(2003)
Adv Model Optim J
, vol.5
, Issue.2
, pp. 93-104
-
-
Hassanien, A.E.1
Jafar, M.A.2
-
18
-
-
43749098533
-
Pulse coupled neural network for detection of masses in digital mammogram
-
Hassanien AE (2006) Pulse coupled neural network for detection of masses in digital mammogram. Neural Netw World J 2/06: 129-141
-
(2006)
Neural Netw World J
, vol.2
, Issue.6
, pp. 129-141
-
-
Hassanien, A.E.1
-
19
-
-
33845214650
-
Fuzzy-rough hybrid scheme for breast cancer detection
-
Hassanien AE (2007) Fuzzy-rough hybrid scheme for breast cancer detection. Image Comput Vision J 25(2): 172-183
-
(2007)
Image Comput Vision J
, vol.25
, Issue.2
, pp. 172-183
-
-
Hassanien, A.E.1
-
21
-
-
0032785523
-
Hidden digital watermarks in images
-
Hsu C-T, Wu J-L (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1): 58-68
-
(1999)
IEEE Trans Image Process
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.-T.1
Wu, J.-L.2
-
27
-
-
38949136659
-
Adaptive lossless steganographic scheme with centralized difference expansion
-
Leea C-C, Wub H-C, Tsaic C-S, Chud Y-P (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit 41: 2097-2106
-
(2008)
Pattern Recognit
, vol.41
, pp. 2097-2106
-
-
Leea, C.-C.1
Wub, H.-C.2
Tsaic, C.-S.3
Chud, Y.-P.4
-
28
-
-
0024700097
-
A theory for multi-resolution signal decomposition: The wavelet representation
-
Mallat SG (1989) A theory for multi-resolution signal decomposition: The wavelet representation. IEEE Trans Pattern Anal Mach Intell II(7): 674-693
-
(1989)
IEEE Trans Pattern Anal Mach Intell
, vol.2
, Issue.7
, pp. 674-693
-
-
Mallat, S.G.1
-
29
-
-
0023383370
-
The capacity of the Hopfield associative memory
-
McEliece R, Posner C, Rodemich R, Santosh R (1987) The capacity of the Hopfield associative memory. IEEE Trans Inform Theory 33(4): 461-482
-
(1987)
IEEE Trans Inform Theory
, vol.33
, Issue.4
, pp. 461-482
-
-
McEliece, R.1
Posner, C.2
Rodemich, R.3
Santosh, R.4
-
32
-
-
0029765001
-
Copyright protection of images using robust digital signatures
-
In: Atlanta, Georgia, May
-
Nikolaidis N, Pitas I (1996) Copyright protection of images using robust digital signatures. In: Proceedings of ICASSP '96, Atlanta, Georgia, May, pp 2168-2171
-
(1996)
Proceedings of ICASSP '96
, pp. 2168-2171
-
-
Nikolaidis, N.1
Pitas, I.2
-
33
-
-
0032680807
-
Information hiding: A survey
-
Petitcolas FAP, Anderson RJ, Kuhn MG (1995) Information hiding: A survey. Proc IEEE, special issue on protection of multimedia content 87(7): 1062-1078
-
(1995)
Proc IEEE, Special Issue on Protection of Multimedia Content
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
34
-
-
85032751954
-
Watermarking schemes evaluation
-
Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process 17(5): 58-64
-
(2000)
IEEE Signal Process
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
37
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Priv 1(3): 32-44
-
(2003)
IEEE Secur Priv
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
38
-
-
0038343934
-
Information fusion in biometrics
-
Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recognit Lett 24: 2115-2125
-
(2003)
Pattern Recognit Lett
, vol.24
, pp. 2115-2125
-
-
Ross, A.1
Jain, A.2
-
40
-
-
0037237543
-
A note on wavelets and diffusions
-
Shen J (2003) A note on wavelets and diffusions. J Comp Anal Appl 5: 147-159
-
(2003)
J Comp Anal Appl
, vol.5
, pp. 147-159
-
-
Shen, J.1
-
41
-
-
0036474718
-
A Wavelet-based watermarking algorithm for ownership verification of digital images
-
Wang Y, Doherty JF, Van Dyck RE (2002) A Wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2): 77-88
-
(2002)
IEEE Trans Image Process
, vol.11
, Issue.2
, pp. 77-88
-
-
Wang, Y.1
Doherty, J.F.2
Van Dyck, R.E.3
-
42
-
-
0030387424
-
A watermark for digital images
-
Wolfgang RB, Delp EJ (1996) A watermark for digital images. Proc ICIP' 96(3): 219-222
-
(1996)
Proc ICIP'
, vol.96
, Issue.3
, pp. 219-222
-
-
Wolfgang, R.B.1
Delp, E.J.2
-
43
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10): 1593-1601
-
(2001)
IEEE Trans Image Process
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
44
-
-
0032312612
-
A public key watermark for image verification and authentication
-
Wong PW (1998) A public key watermark for image verification and authentication. IEEE Int Conf Image Process 1: 455-459
-
(1998)
IEEE Int Conf Image Process
, vol.1
, pp. 455-459
-
-
Wong, P.W.1
-
45
-
-
56149106429
-
A Robust Information Hiding Methodology in Wavelet Domain
-
Yang M, Trifas M, Bourbakis, Cushing C (2007) A Robust Information Hiding Methodology in Wavelet Domain. Signal and Image Processing, SIP 2007. Honolulu, USA Proceeding
-
(2007)
Signal and Image Processing, SIP 2007. Honolulu, USA Proceeding
-
-
Yang, M.1
Trifas, M.2
Bourbakis Cushing, C.3
-
46
-
-
42749096863
-
Inverted pattern approach to improve image quality of information hiding by LSB substitution
-
Accessed 9 Feb 2008
-
Yang C-H (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognit. http:// www.sciencedirect.co. Accessed 9 Feb 2008
-
(2008)
Pattern Recognit
-
-
Yang, C.-H.1
-
47
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
Zhang X, Wang S (2005) Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process Lett 12: 67-70
-
(2005)
IEEE Signal Process Lett
, vol.12
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
-
48
-
-
43849108605
-
The upper and lower bounds of the information-hiding capacity of digital images
-
doi: 10.1016/j.ins.2008.03.011
-
Zhang F, Pan Z, Cao K, Zheng F, Wu F (2008) The upper and lower bounds of the information-hiding capacity of digital images. Inform Sci. doi: 10.1016/j.ins.2008.03.011
-
(2008)
Inform Sci
-
-
Zhang, F.1
Pan, Z.2
Cao, K.3
Zheng, F.4
Wu, F.5
|